Blog

5 Reasons Why Securing Your Web Applications Should Be a Top Priority

Is your company ignoring these threats?

Company websites and web applications represent one of the most significant vulnerabilities to attack. Yet they are one of the most common areas companies overlook. Learn the five reasons why web applications are overlooked as risks.

Continue Reading

Why Our Partnership with Options Is Good News for Financial Services

Details on Observable’s recent partnership with Options.

A new partnership between Observable Networks and Options promises to deliver more modern security capabilities and improved services to financial services companies. Find out why our combined strengths will provide better protection to financial organizations.

Continue Reading

The Not-So-Hidden Risk Behind the Apple Encryption Controversy

If Apple cooperates with FBI, who will watch the watchers?

This article offers our point of view on the controversy surrounding the FBI’s request that Apple create an unencrypted version of the iPhone operating system.

Continue Reading

What Does it Take to Keep the Nation’s Top Hacker Out of Your Network?

Dynamic Endpoint Modeling is exactly the solution the NSA recommends to thwart hackers.

In a recent presentation, the National Security Agency’s top hacker outlined a number of best practices for keeping his team – or anyone else – out of your network. Most critical: a solution that can provide complete visibility into network traffic and provide real-time alerts in response to any anomalies. A solution just like Dynamic Endpoint Modeling.

Continue Reading

A New Ovum Report Recommends Dynamic Endpoint Modeling

Dynamic Endpoint Modeling gets a gold star from analyst firm Ovum.

Ovum, a trusted IT analyst, recently published a report that details the many compelling reasons why any organization should consider Dynamic Endpoint Modeling as an additional security component. This article offers highlights and lets you download the report itself.

Continue Reading

Firewall Hole Punching: Known, Unknown, and Unexpected Risks

Many companies choose to punch a hole in their firewall to connect applications or systems – even though this presents a security risk.

IT often chooses to punch holes in firewalls, yet doing so can present security risks. This article looks at ways to protect yourself when hole punching is required and how to prepare for unexpected vulnerabilities.

Continue Reading